Solved

Cisco 3750 trunk to Extreme 450

Posted on 2013-11-05
9
1,134 Views
Last Modified: 2013-11-07
I am trunking a Cisco 3750 to an Extreme 450 and when I plug into the port I'm unable to pull an address from the DHCP server on the extreme side.

Below is the 3750 config;

interface Port-channel7
 description Etherchannel Trunks to Extreme Switch
 switchport trunk encapsulation dot1q
 switchport trunk native vlan 998
 switchport trunk allowed vlan 998,999
 switchport mode trunk
end
!
interface GigabitEthernet1/0/21
 description temp connection to extreme core
 switchport trunk encapsulation dot1q
 switchport trunk native vlan 998
 switchport trunk allowed vlan 998,999
 switchport mode trunk
 channel-group 7 mode active
end
!
interface GigabitEthernet1/0/23
 description temp connection to extreme core
 switchport trunk encapsulation dot1q
 switchport trunk native vlan 998
 switchport trunk allowed vlan 998,999
 switchport mode trunk
 channel-group 7 mode active
end
!
interface GigabitEthernet2/0/15
 description temp connx to Vlan 998
 switchport access vlan 998
 switchport mode access
 spanning-tree portfast
 spanning-tree bpduguard enable
0
Comment
Question by:solarisjunkie
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
9 Comments
 
LVL 26

Expert Comment

by:Soulja
ID: 39625347
Is the extreme switch using LACP also and the same native vlan?

Which vlan are you trying to receive dchp from.
0
 

Author Comment

by:solarisjunkie
ID: 39625406
From a 10.x.x.x but does the config look to be good for the most part
0
 
LVL 26

Expert Comment

by:Soulja
ID: 39625415
Would need to see the config on both ends as well as the any dhcp relay configs if required but yes the port channel config on the Cisco side looks good.
0
Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

 

Author Comment

by:solarisjunkie
ID: 39625580
Extreme Config:

# Module devmgr configuration.
#
configure snmp sysName "Linthicum250-x450"
configure snmp sysLocation "Linthicum"
configure snmp sysContact "Page_Network:critical"
configure timezone name CDT -360 autodst
configure sys-recovery-level switch reset

#
# Module vlan configuration.
#
configure vlan default delete ports all
configure vr VR-Default delete ports 1-50
configure vr VR-Default add ports 1-50
configure vlan default delete ports 1-50
create vlan "ip11"
configure vlan ip11 tag 11
create vlan "ip191"
configure vlan ip191 tag 191
create vlan "ip4000"
configure vlan ip4000 tag 4000
create vlan "ip923"
configure vlan ip923 tag 923
create vlan "ip998"
configure vlan ip998 tag 998
create vlan "ip999"
configure vlan ip999 tag 999
enable sharing 21 grouping 21-22 algorithm address-based L2 lacp
configure vlan ip11 add ports 1-2 tagged
configure vlan ip11 add ports 17 untagged
configure vlan ip191 add ports 2 tagged
configure vlan ip923 add ports 2 tagged
configure vlan ip998 add ports 1-2, 21 tagged
configure vlan ip998 add ports 3-15, 18-20, 23-48 untagged
configure vlan ip999 add ports 1-2, 21 tagged
configure vlan ip999 add ports 16 untagged
configure vlan Mgmt ipaddress 172.16.xx.xxx 255.255.255.224

#
# Module fdb configuration.
#

#
# Module rtmgr configuration.
#
disable ip-option loose-source-route
configure iproute add default 172.16.xx.xxx vr VR-Mgmt
configure iproute add default 172.16.0.1 vr VR-Mgmt

#
# Module mcmgr configuration.
#

#
# Module aaa configuration.
#
configure radius mgmt-access primary server 172.16.xx.xx 1812 client-ip 172.16.1.xx vr VR-Mgmt
configure radius mgmt-access primary shared-secret encrypted "xxxxxx"
configure radius mgmt-access secondary server 172.16.xx.xx 1812 client-ip 172.16.xx.xx vr VR-Mgmt
configure radius mgmt-access secondary shared-secret encrypted "xxxxxx"
configure radius netlogin primary server 172.16.0.30 1812 client-ip 172.16.x.x vr VR-Mgmt
configure radius netlogin primary shared-secret encrypted "xxxxxxxxxx"
enable radius mgmt-access
enable radius netlogin
configure account admin encrypted "xxxxxxxxxx"
configure account all password-policy lockout-on-login-failures on
configure account admin password-policy lockout-on-login-failures on

#
# Module acl configuration.
#




#
# Module bfd configuration.
#

#
# Module cfgmgr configuration.
#
configure idletimeout 10

#
# Module dosprotect configuration.
#

#
# Module dot1ag configuration.
#

#
# Module eaps configuration.
#

#
# Module edp configuration.
#

#
# Module elrp configuration.
#

#
# Module ems configuration.
#
configure syslog add 172.16.x.x:xxx vr VR-Mgmt local7
enable log target syslog 172.16.x.x:514 vr VR-Mgmt local7
configure log target syslog 172.16.x.x:514 vr VR-Mgmt local7 filter DefaultFilter severity Debug-Data
configure log target syslog 172.16.x.x:514 vr VR-Mgmt local7 match Any
configure log target syslog 172.16.x.x:514 vr VR-Mgmt local7 format timestamp seconds date Mmm-dd event-name none priority tag-name
configure syslog add 10.3.x.x:514 vr VR-Mgmt local7
enable log target syslog 10.3.x.x:514 vr VR-Mgmt local7
configure log target syslog 10.3.150.32:514 vr VR-Mgmt local7 filter DefaultFilter severity Info
configure log target syslog 10.3.150.32:514 vr VR-Mgmt local7 match Any
configure log target syslog 10.3.150.32:514 vr VR-Mgmt local7 format timestamp seconds date Mmm-dd event-name none priority tag-name
configure syslog add 10.3.x.x:514 vr VR-Mgmt local7
enable log target syslog 10.3.x.x:514 vr VR-Mgmt local7
configure log target syslog 10.3.x.x:514 vr VR-Mgmt local7 filter DefaultFilter severity Info
configure log target syslog 10.3.x.x:514 vr VR-Mgmt local7 match Any
configure log target syslog 10.3.x.x:514 vr VR-Mgmt local7 format timestamp seconds date Mmm-dd event-name none priority tag-name
configure syslog add 10.4.x.x:514 vr VR-Mgmt local7
enable log target syslog 10.4.x.x:514 vr VR-Mgmt local7
configure log target syslog 10.4.x.x:514 vr VR-Mgmt local7 filter DefaultFilter severity Info
configure log target syslog 10.4.x.x:514 vr VR-Mgmt local7 match Any
configure log target syslog 10.4.x.x:514 vr VR-Mgmt local7 format timestamp seconds date Mmm-dd event-name none priority tag-name

#
# Module epm configuration.
#

#
# Module erps configuration.
#

#
# Module esrp configuration.
#

#
# Module ethoam configuration.
#

#
# Module etmon configuration.
#
enable sflow
configure sflow collector 192.168.x.x port 6343 vr "VR-Mgmt"
enable sflow ports 1
enable sflow ports 2
enable sflow ports 3
enable sflow ports 4
enable sflow ports 5
enable sflow ports 6
enable sflow ports 7
enable sflow ports 8
enable sflow ports 9
enable sflow ports 10
enable sflow ports 11
enable sflow ports 12
enable sflow ports 13
enable sflow ports 14
enable sflow ports 15
enable sflow ports 16
enable sflow ports 17
enable sflow ports 18
enable sflow ports 19
enable sflow ports 20
enable sflow ports 21
enable sflow ports 22
enable sflow ports 23
enable sflow ports 24
enable sflow ports 25
enable sflow ports 26
enable sflow ports 27
enable sflow ports 28
enable sflow ports 29
enable sflow ports 30
enable sflow ports 31
enable sflow ports 32
enable sflow ports 33
enable sflow ports 34
enable sflow ports 35
enable sflow ports 36
enable sflow ports 37
enable sflow ports 38
enable sflow ports 39
enable sflow ports 40
enable sflow ports 41
enable sflow ports 42
enable sflow ports 43
enable sflow ports 44
enable sflow ports 45
enable sflow ports 46
enable sflow ports 47
enable sflow ports 48
enable sflow ports 49
enable sflow ports 50

#
# Module exsshd configuration.
#

#
# Module hal configuration.
#

#
# Module idMgr configuration.
#

#
# Module ipSecurity configuration.
#

#
# Module ipfix configuration.
#

#
# Module lacp configuration.
#

#
# Module lldp configuration.
#
enable lldp ports 1
enable lldp ports 2
enable lldp ports 3
enable lldp ports 4
enable lldp ports 5
enable lldp ports 6
enable lldp ports 7
enable lldp ports 8
enable lldp ports 9
enable lldp ports 10
enable lldp ports 11
enable lldp ports 12
enable lldp ports 13
enable lldp ports 14
enable lldp ports 15
enable lldp ports 16
enable lldp ports 17
enable lldp ports 18
enable lldp ports 19
enable lldp ports 20
enable lldp ports 21
enable lldp ports 22
enable lldp ports 23
enable lldp ports 24
enable lldp ports 25
enable lldp ports 26
enable lldp ports 27
enable lldp ports 28
enable lldp ports 29
enable lldp ports 30
enable lldp ports 31
enable lldp ports 32
enable lldp ports 33
enable lldp ports 34
enable lldp ports 35
enable lldp ports 36
enable lldp ports 37
enable lldp ports 38
enable lldp ports 39
enable lldp ports 40
enable lldp ports 41
enable lldp ports 42
enable lldp ports 43
enable lldp ports 44
enable lldp ports 45
enable lldp ports 46
enable lldp ports 47
enable lldp ports 48
enable lldp ports 49
enable lldp ports 50

#
# Module msdp configuration.
#

#
# Module netLogin configuration.
#
configure netlogin vlan ip4000
enable netlogin dot1x
enable netlogin ports 18 dot1x
configure netlogin ports 18 mode port-based-vlans
configure netlogin ports 18 no-restart

#
# Module netTools configuration.
#
configure dns-client add name-server 172.16.x.x vr VR-Mgmt
configure dns-client add domain-suffix net.noridian.com
configure sntp-client primary 172.16.x.x vr VR-Mgmt
configure sntp-client secondary 192.168.x.x vr VR-Mgmt
enable sntp-client

#
# Module poe configuration.
#

#
# Module rip configuration.
#

#
# Module ripng configuration.
#

#
# Module snmpMaster configuration.
#
configure snmpv3 add user xxxxxxx authentication sha auth-encrypted hex a9:f0:c0:49:ce:1b:1e:47:ff:ce:01:24:a2:7b:14:1d:1f:98:20:5c privacy privacy-encrypted hex a9:f0:c0:49:ce:1b:1e:47:ff:ce:01:24:a2:7b:14:1d:1f:98:20:5c
configure snmpv3 add group xxxxx user xxxxx sec-model snmpv1
configure snmpv3 add group xxxxxx user xxxxxx sec-model snmpv2c
configure snmpv3 add group xxxxx user xxxxx sec-model usm
configure snmpv3 add access xxxxxxx sec-model usm sec-level priv read-view defaultAdminView write-view defaultAdminView notify-view defaultAdminView
configure snmpv3 add access xxxxx sec-model usm sec-level noauth read-view defaultUserView notify-view defaultNotifyView
configure snmpv3 add access xxxxxx sec-model usm sec-level noauth read-view defaultUserView notify-view defaultNotifyView
configure snmpv3 add community xxxxxx name xxxxxx user xxxxxxx
configure snmpv3 add target-addr v1v2cNotifyTAddr1 paramxxxxxNotifyParam1 ipaddress 172.16.x.x transport-port 162 vr VR-Mgmt tag-list defaultNotify
configure snmpv3 add target-params xxxxxx user xxxxxUser1 mp-model snmpv2c sec-model snmpv2c sec-level noauth

#
# Module stp configuration.
#
configure mstp region 00049635e296
configure stpd s0 delete vlan default ports all
disable stpd s0 auto-bind vlan default
enable stpd s0 auto-bind vlan Default

#
# Module telnetd configuration.
#
disable telnet

#
# Module tftpd configuration.
#

#
# Module thttpd configuration.
#

#
# Module vmt configuration.
#

#
# Module vsm configuration.
#
0
 
LVL 26

Expert Comment

by:Soulja
ID: 39627509
I am assuming this is the port channel and trunk config config:

enable sharing 21 grouping 21-22 algorithm address-based L2 lacp
configure vlan ip11 add ports 1-2 tagged
configure vlan ip11 add ports 17 untagged
configure vlan ip191 add ports 2 tagged
configure vlan ip923 add ports 2 tagged
configure vlan ip998 add ports 1-2, 21 tagged
configure vlan ip998 add ports 3-15, 18-20, 23-48 untagged
configure vlan ip999 add ports 1-2, 21 tagged
configure vlan ip999 add ports 16 untagged
configure vlan Mgmt ipaddress 172.16.xx.xxx 255.255.255.224

#

If so I don't see any config issues. I also assume this switch is layer 2 only correct?
0
 

Author Comment

by:solarisjunkie
ID: 39627825
That is correct those are the trunked port channel config and it is a layer 2 switch. I was thinking I had to put a dhcp relay on the cisco side but there is no bootprelay on the extreme side.
0
 
LVL 26

Expert Comment

by:Soulja
ID: 39628238
You will have to put a dchp relay on the cisco side if you are trying to get dhcp addresses from a vlan other than the one that the dhcp server is sitting on. Which network is the dhcp server on and which network is dhcp failing?
0
 

Author Comment

by:solarisjunkie
ID: 39628391
The dhcp server is sitting on a 10.2.101.x network which means that I'd have to configure the vlan interface with IP on my cisco side correct ?

sample below:

interface Vlan998
 ip address 192.168.998.1 255.255.255.0
 ip helper-address 10.2.101.xx
0
 
LVL 26

Accepted Solution

by:
Soulja earned 500 total points
ID: 39628445
Yes, that is correct.
0

Featured Post

How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article will step through configuring a SonicWALL appliance to utilize an internal DHCP server for Global VPN Client (GVC) hosts.  There are times when using an external (external to the SonicWALL) DHCP server, such as Windows Servers, isn’t pr…
I eventually solved a perplexing problem setting up telnet for a new switch.  I installed a new Cisco WS-03560X-24P switch connected to an existing Cisco 4506 running a WS-X4013-10GE Sup II-Plus. After configuring vlans and trunking,  I could no…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question